Asterisk 16.4.1 is Ready for You, Specially PJSIP and chan_sip Users.
The Asterisk 16.4.1 release has been made to address the security
vulnerabilities that have been identified. Specially AST-2019-002, AST-2019-003 follow the links to learn about the r each vulnerability that includes additional
information. Users of versions of Asterisk that are affected are
strongly encouraged to review the advisories and determine what action
they should take to protect their systems from these issues.
Security Advisories:
The data in this summary reflects changes that have been made since the previous release, asterisk-16.4.0.
Security Advisories:
The data in this summary reflects changes that have been made since the previous release, asterisk-16.4.0.
Download here
2019-07-11 19:25 +0000 Asterisk Development Team <asteriskteam@digium.com> * asterisk 16.4.1 Released. 2019-06-12 13:03 +0000 [c2319178b2] George Joseph <gjoseph@digium.com> * res_pjsip_messaging: Check for body in in-dialog message We now check that a body exists and it has a length > 0 before attempting to process it. ASTERISK-28447 Reported-by: Gil Richard Change-Id: Ic469544b22ab848734636588d4c93426cc6f4b1f 2019-06-28 11:15 +0000 [3c185d0620]
Francesco Castellano <francesco.castellano@messagenet.it> * chan_sip: Handle invalid SDP answer to T.38 re-invite The chan_sip module performs a T.38 re-invite using a single media stream of udptl, and expects the SDP answer to be the same. If an SDP answer is received instead that contains an additional media stream with no joint codec a crash will occur as the code assumes that at least one joint codec will exist in this scenario. This change removes this assumption. ASTERISK-28465 Change-Id: I8b02845b53344c6babe867a3f0a5231045c7ac87
0 comments:
Post a Comment